Vulnerability Description
An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Binutils | >= 2.35, < 2.39-7 |
| Fedoraproject | Fedora | 37 |
| Redhat | Enterprise Linux | 6.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2150768ExploitIssue TrackingPatch
- https://security.gentoo.org/glsa/202309-15
- https://sourceware.org/bugzilla/show_bug.cgi?id=29699ExploitIssue TrackingPatch
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6ab
- https://bugzilla.redhat.com/show_bug.cgi?id=2150768ExploitIssue TrackingPatch
- https://security.gentoo.org/glsa/202309-15
- https://sourceware.org/bugzilla/show_bug.cgi?id=29699ExploitIssue TrackingPatch
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6ab
FAQ
What is CVE-2022-4285?
CVE-2022-4285 is a vulnerability with a CVSS score of 5.5 (MEDIUM). An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an inc...
How severe is CVE-2022-4285?
CVE-2022-4285 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-4285?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Binutils, Fedoraproject Fedora, Redhat Enterprise Linux.